This document discusses using symmetric encryption for confidentiality. It describes link encryption, where encryption devices are placed at each end of a link, and end-to-end encryption, where the source encrypts and receiver decrypts. While end-to-end encryption protects data contents over the entire path, link encryption also protects traffic flows from being monitored. Both link and end-to-end encryption provide the highest security, but require more encryption devices. The document also notes that while end-to-end encryption protects content, traffic analysis can still analyze flow patterns by observing unencrypted headers.